Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe
Resource
win7-20240903-en
General
-
Target
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe
-
Size
328KB
-
MD5
586bdb5f4c93be7c1eda0a4aaad6b829
-
SHA1
96c7fac9812247cad8152be5206d8ceee7ac9247
-
SHA256
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121
-
SHA512
29e54c4dfa45851a36255716c2eca90754bb14997e12fd058edaa655e8bf8b8fb932067f407e43b9e5bf35d1136d74658b32319e52277d28d88a2157332dbf12
-
SSDEEP
6144:qfNEub3DnLw24d5+L+WpZeH8hwNUBizYvZWzqWUYxO:qmubD8L5c+WpZeH82Nv0vQyY
Malware Config
Extracted
xloader
2.3
goei
bet365o2.com
gulf-landlord.info
foodsystemsjusticeproject.com
ronwongart.com
fwgkdhg.icu
armanrugservice.com
mapadequito.com
vbkulkarni.com
ltsbinge.com
creativem2.com
mindflexlab.com
ushealthvisa.com
247carkeyslondon.com
addthat.xyz
zanzan8.com
legendsalliance.net
shopflyonline.com
csgo-roll.net
reutbergcapital.com
mediaworkhouse.com
office-tourism-tirana.com
evecrude.xyz
sportwillwin.com
cluskmusk.com
her2mymeme.com
rsw3313.com
digitalmarketingmoves.com
seaworldminecraft.com
onlinecollegetherapy.com
ourmonaca.com
generalflix.com
limonproduce.com
casalomasymphonyorchestra.com
karyapertama.com
massaponaxhighschool.com
covidtracksb.com
breathharbour.net
italianrealestateagents.com
xn--ga-c9a.com
libreo.club
leverhump.store
kevinrsamuels.network
pimpmyrecipe.com
win-back.online
kelasipo.com
caross-china.com
ly-iot.com
nolimitsynthetics.net
epicfriend.club
19come.com
lcjzjt.com
lxpvccard.com
distributorfocuson.com
looneytunesrun.com
mariebiernacki.com
maquinaclub.com
randalldavisauthor.com
niggeruprising.com
theexpatweightcoach.com
mex33.info
imbravura.com
baldosasanjose.com
akindousa.com
ourmunera.net
batiktintaemas.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2400-2-0x0000000000220000-0x000000000024A000-memory.dmp xloader behavioral1/memory/2720-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2720 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30 PID 2400 wrote to memory of 2720 2400 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-